Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. nokogiri
  4. ›
  5. CVE-2022-29181

CVE-2022-29181: Improper Handling of Unexpected Data Type

May 20, 2022 (updated February 16, 2023)

Nokogiri is an open source XML and HTML library for Ruby. Nokogiri prior to version 1.13.6 does not type-check all inputs into the XML and HTML4 SAX parsers, allowing specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory. Version 1.13.6 contains a patch for this issue. As a workaround, ensure the untrusted input is a String by calling #to_s or equivalent.

References

  • github.com/advisories/GHSA-xh29-r2w5-wx8m
  • github.com/sparklemotion/nokogiri/commit/db05ba9a1bd4b90aa6c76742cf6102a7c7297267
  • github.com/sparklemotion/nokogiri/releases/tag/v1.13.6
  • github.com/sparklemotion/nokogiri/security/advisories/GHSA-xh29-r2w5-wx8m
  • nvd.nist.gov/vuln/detail/CVE-2022-29181
  • securitylab.github.com/advisories/GHSL-2022-031_GHSL-2022-032_Nokogiri/

Code Behaviors & Features

Detect and mitigate CVE-2022-29181 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.13.6

Fixed versions

  • 1.13.6

Solution

Upgrade to version 1.13.6 or above.

Impact 8.2 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-241: Improper Handling of Unexpected Data Type

Source file

gem/nokogiri/CVE-2022-29181.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:49 +0000.